Configuring Keystroke with KeyPay
|
|
|
- Basil Atkins
- 10 years ago
- Views:
Transcription
1 Configuring Keystroke with KeyPay Please read the PA-DSS Implementation Guide for Keystroke POS from our website before proceeding. It is also installed in the \KEYSTROK\DOC subdirectory on your computer. Choose a Secure Computer to Host the KeyPay Program The Keystroke Payment Module (KeyPay) can be installed either as a conventional Windows program (KeyPay.exe) or as a Windows Service (KPsvc.exe). SBS recommends the Service method for most users. Whichever method is used, the KeyPay module should be installed on a single computer to handle payment requests for all workstations. It is important to select a computer physically located in a secure location with access limited to authorized personnel only. This computer, the primary file server, and all POS workstations should also be protected by a secure firewall. Whether the computer hosting KeyPay is a file server itself or an office workstation, it must always be started/running before other POS workstations in order to ensure payments can be reliably processed. Notes: In this document, unless otherwise designated, the term KeyPay may refer to either installation method (conventional program or Windows Service). The KeyPay program can support multiple merchant accounts (Credit, Gift Cards, etc.) KeyPay and Keystroke POS are designed to run on Windows 7 and later and require Microsoft.NET Framework 4.5. PCI Settings in Keystroke POS The official PCI website at provide detailed information to help your business protect payment card data and operate in a PCI-DSS compliant environment. Also refer to the Keystroke POS document: PA-DSS Implementation Guide for Keystroke POS. Following is a partial list of PCI-DSS related concerns and software settings, most of which may be automatically enabled the first time Keystroke Version 8.00 or later is run. 1. Purge all previously processed payment data. When using KeyPay, payment data is not stored in Keystroke data files, so purging is not necessary. If converting from an earlier version to v8.00, you may be prompted to purge all previously processed payment data. If you use an Authorization Method other than KeyPay, the Keystroke system should be configured to automatically purge payment data on a regular basis. Relevant settings: Closeout function, Closeout menu, Parameters Purge Payments: On Save - Automatic, Minimum Interval 1 Day, Payments Over 3 Days. Closeout function, Closeout menu, Purge Payments. Configuration Manager, Tables menu, Sales Payment Types Purge Ref/ExpDate Immediately. Page 1 of 11 12/8/2015
2 2. Require re-entry of the Clerk and Password on idle workstations. The Keystroke system is configured to automatically prompt for a Clerk and Password after no greater than 15 minutes of inactivity. Relevant settings: Configuration Manager, Settings menu, Parameters Auto Logout Time (15 minutes maximum). Sales/Purchase Manager, Transaction menu, Parameters, Display Auto Logout Time (15 minutes maximum, typically the same or less than the Global Parameter Screen Saver Time). 3. Maintain strong passwords. The passwords of Clerks with manager level access (typically those with Security Level 0-5, although recommended for all Clerks) must be a minimum of seven characters in length and include both numeric and alphabetic characters. Passwords must also be changed every 90 days and new passwords cannot be the same as the last four passwords used. Relevant settings: Clerk Database records Last Changed and Expires dates. Configuration Manager, Settings menu, Parameters Passwords setting box. This is based on the lowest Security Level for Edit Clerks, Add Clerks, Change Parameters, File Maintenance, and Edit Security Levels. Installing KeyPay Installing the KeyPay Program (vs. Windows Service) The conventional Windows program (KeyPay.exe) is fully installed (but not launched) as part of the Keystroke program installation. The KeyPay.exe program file can be found in the main \KEYSTROK program directory. If you intend to use this program and not the recommended KeyPay Windows Service, the KeyPay.exe program should be added to the Windows Startup folder (or an automated Batch program) on a single designated computer only. Installing KeyPay as a Windows Service (Recommended) The Windows Service version of KeyPay (KPSvc.exe) is also copied to the \KEYSTROK program directory, but must be properly installed before it can be accessed. Run the Keystroke Update Installer (from the Start Menu, Keystroke POS folder). Then click on the Keystroke Extensions icon to download and install the Keystroke Payment Module as a Windows Service. After the Welcome and License Agreement screens, you will be prompted to enter the location where KeyPay Service will be installed. If Keystroke POS is found, and installed on your local C: drive, the installation will default to that directory (usually C:\KEYSTROK). If Keystroke POS is not installed locally, then the installation will default to C:\ KEYSTROK. You can change these settings during the installation, but it is recommended to use the default location so the KeyPay Service program will be updated automatically when Keystroke POS is updated. Page 2 of 11 12/8/2015
3 After you begin the installation, you may be notified if the KeyPay Service was already running. Following the prompt shown below, the Service will be stopped automatically, and for the remainder of the installation you will not be able to process payments until the setup is complete. On machines with a firewall, such as Microsoft Windows Firewall, you may see a similar screen shown below regarding KPSvc.exe. You will need to click on the Allow Access (or Unblock) option to allow the KeyPay Service to access the internet. The KeyPay Service setup will automatically allow both KeyPay.exe and KPSvc.exe into both the Public and Home/Work (Private) networks. If other Firewall Software is installed (McAfee, Norton, etc.), you will have to make exceptions in that software manually. During the installation, you will be automatically prompted to configure KeyPay settings such as Merchant Number, Data Directory, and Password (see next page). Un-Install Other Payment Programs If your business was using a different integrated payment processing program with Keystroke (e.g., PCCharge or ICVerify), be sure to terminate and completely un-install all instances of such programs or Windows Services after KeyPay is completely installed, configured and tested. Review the Windows Startup folder and any other means of automatically launching programs on all computers, file servers, and workstations. Note: If you are using another payment processing software, please make sure you close your current payment batch before uninstalling their software. Page 3 of 11 12/8/2015
4 Configuring KeyPay Upon initial installation of the KeyPay Service, you will be automatically placed in the Keystroke Payment Module - Settings dialog box shown at the top of the following page. After initial installation of the KeyPay Service, you can access these Settings by selecting the KeyPay Settings icon from your Keystroke POS folder on the Windows Start menu. If running KeyPay as a conventional Windows program, the application should appear on your Windows Notification Area where you can double click the KeyPay icon to access the main Keystroke Payment Module status screen shown immediately below. Click Settings to access the KeyPay Settings, or click Hide to return KeyPay to the Taskbar and leave the program operational. If you click Shutdown (or the Red X), the program will be terminated and unable to process payments until it is restarted. If running the service, to access the settings, there is a shortcut to KeyPay Settings in your Program Menu, under Keystroke POS. If KeyPay has been previously configured, you will be prompted to enter your existing Password. If you have not configured KeyPay, you will be taken to the Settings page (see next page) where you will be required to enter a password. Page 4 of 11 12/8/2015
5 KeyPay Settings For most installations with a single merchant account, the Settings ID should remain set to (Default), and Process Through set to Mercury. The Business Name is provided by your merchant service provider (if necessary). If you have more than one Mercury Merchant Account such as for multiple business locations or an e-commerce site, you may wish to create a separate Settings ID for each account using the Add ID button. If using multiple Settings IDs, you must also specify corresponding Settings IDs in the Authorization Methods in the Keystroke POS program. Enter your Mercury Merchant Number and verify that the Data Directory and Status Directory are both set to correspond with the location of your Keystroke Data Directory. Select the appropriate Connection Type, and if a Dialup modem is available, select Modem Settings to complete and test the modem settings. In most cases, IP Port Number can be left at 0 which will allow the computer to automatically assign an available number each time. A number can be entered here if the port needs to be fixed in order to allow communications to pass through a firewall. Page 5 of 11 12/8/2015
6 If Check for NIC Address Changes is On, the program will check the IP Address and Port Number every 20 seconds and then update the KPSTATUS.TMP file if anything has changed. Leave this parameter OFF unless the IP address changes while the system is running. Enter a secure Password (7 characters and at least 1 number and 1 letter case sensitive). Change Cryptographic Keys resets the keys used by KeyPay to securely encrypted cardholder data. They should be changed at least annually. The Test button can be used to communicate with the processor (if processing with Mercury). It will establish a connection w/ Mercury and confirm that KeyPay and Mercury are communicating. Click Save to continue. You will be asked to confirm your Password (if changed or a new one entered). Re-enter your password and click Ok to save the settings. Page 6 of 11 12/8/2015
7 Additional Network Settings (for KeyPay Service Only) If the KeyPay Service is installed on a different computer than where the Keystroke data files are located (such as a communications server), the Windows Service must be enabled to access the Data and Status Directories over the network. To enable access for the KeyPay Service: 1. The Data Directory and Status Directory in the KeyPay Settings need to be entered using Universal Naming Convention (UNC) names (e.g., \\server\c\keystrok\data). 2. You may need to edit the Service in Windows and modify the Log On tab to specify a Login User with a Password. Users without Passwords are not allowed to run a Service over a network. Follow the steps below: a. From the Windows Start menu, select Administrative Tools, and Services. b. Find the Keystroke Payment Module Service, and double-click to open its properties. c. Under the Log On tab, change the settings from Local System account to This account: and type in the User as.\username (typing in the.\ before the username - e.g.,.\administrator ). Note: You can use the Browse Button, then click Advanced, then Find Now to see a listing of the valid Users for this computer. d. Enter your Password (required). e. Click Apply, and Ok to save the settings. f. Lastly, you must Stop and Start (or Restart) the service for changes to take effect. Page 7 of 11 12/8/2015
8 Configuring Keystroke POS for Processing with KeyPay You are now ready to configure Payment Types in Keystroke POS. In the Configuration Manager, select Tables, Sales Payment Types and an appropriate Payment Type like Visa/MC/Disc. Select the Auth Method button, and either select an available Authorization Method such as KPCredit (for typical credit cards) or press or to create a new Authorization Method. If adding a new Auth Method, assign a unique name and select Keystroke Payment Module as the type. To view/edit the current settings for an Authorization Method, press from the list of Auth Methods (i.e. when KPCredit is highlighted). Repeat the process above for each electronically processed Payment Type. You will need a unique Authorization Method for each different class of payment (Credit, Debit, Gift, EBT, etc.). Authorization File Setup The Keystroke POS program ships with a default authorization file "KPCredit.aut" (shown below). While the settings can be changed, in most cases it will work with its default settings. Note that the Merchant ID is not entered here, but rather is entered in the KeyPay program itself. Page 8 of 11 12/8/2015
9 Status File Location This identifies the location of the file KPSTATUS.TMP, used by Keystroke to identify how to process payments. If left blank, the program will use the current data directory. It is recommended to leave this field blank. Server Address This is the TCP/IP address of the machine where KeyPay is running. Keystroke typically gets this information from the Status file. It is recommended to leave this field blank. If your firewall blocks most addresses or you have two network adaptors in use, it may be necessary to specify the server address. Server and Local Port Numbers This is the TCP/IP port used for processing payments on the machine where KeyPay is running and the local machine running Keystroke. It is recommended to leave these fields blank (0). If your firewall blocks ports it may be necessary to specify the port number. Note: As long as the KeyPay Status File (KPSTATUS.TMP) is in the Keystroke Data Directory, you can leave the fields above blank (0 for Port Numbers) and the program will get the information from the KPSTATUS.TMP file as it needs it. Settings ID The "Settings ID" field is used to identify which settings in KeyPay are to be used to process the request. Leaving this blank will use the default settings in KeyPay (which will work for most installations). Multiple settings are only needed if processing using multiple Merchant ID installations. Type The type of payment to be processed (Credit, Debit, Gift, EBT, etc.). Various Other Checkboxes Turn On/Off the appropriate check boxes for each type of authorization Method (optional). Test KeyPay The Test KeyPay button will locate the KPSTATUS.TMP file, ping the server and run a series of test transactions. It can be run from any workstation to ensure that it is properly communicating with KeyPay. If this test fails, check your Firewall settings and be sure KEYPAY.EXE, KPSVC.EXE and KEYSTROK.EXE are all allowed as exceptions. Page 9 of 11 12/8/2015
10 Processing Payments using Keystroke POS with KeyPay With Keystroke POS and KeyPay properly installed and configured, processing payments is a snap. For example, in the Sales Manager, after entering a sale and swiping a payment card in the appropriate Payment Authorization Reference field (or manually typing the card number, etc.), select Ok to begin the payment authorization. In a matter of just a few seconds, Keystroke passes the payment information to KeyPay using a high level encryption method. KeyPay then requests authorization to complete the payment, and returns a response to Keystroke along with a tokenized form of the original payment card number. The tokenized number is a masked number where only the first 2 and last 4 digits are the same as the original card number. This helps to ensure sensitive card data is not exposed any more than is necessary. Some payment card data is temporarily retained by KeyPay in a secure format to enable tasks such as voiding transactions shortly after completion. However, no unnecessary functionality is provided for reporting, displaying, or in any way exposing sensitive payment card data. Your merchant service provider can assist you if it is necessary to obtain a complete payment card number after a payment has been processed. Processing Recurring Charges Keystroke and KeyPay can be used to automatically process regularly recurring transactions such as for monthly fees, including credit card payments if needed. This function emulates the same procedure a Clerk would perform manually to copy existing transactions such as from the alternate Sales Transaction Type Recurring Charges and save them as normal Sales Invoices. In Keystroke Advanced POS, you process transactions in Sales Manager, under the Special menu, Process Recurring Transactions. In Keystroke POS, the program RECCHRG.EXE can be used to automate this process (but less functionality exists). As transactions are copied, the payments are also copied and processed through KeyPay (if configured with an appropriate Authorization Method). Any payment that fails to be processed will be copied to an alternate Transaction Type (such as On Hold) so that the reason for failure such as an expired credit card can be reviewed and corrected. RECCHRG.EXE supports all the standard Keystroke command line switches and some special switches, and can easily be run from a batch file. A typical command line would look like: C:\KEYSTROK\RECCHRG.EXE FROM=REC TO=NVC ALT=HOLD This command would copy all sales transactions identified with the Recurring Charges (REC) Transaction Type to Sales Invoices (NVC), and save any problem transactions as On Hold transactions for later review. For additional instructions, please see RECCHRG.DOC in the \KEYSTROK\DOC directory or contact your Authorized Keystroke Dealer for personal assistance. Page 10 of 11 12/8/2015
11 Emergency Stand-Alone Workstation Setup (Optional) Keystroke and KeyPay can be pre-configured to run in a stand-alone workstation mode as a temporary measure in the event of an unexpected computer network failure (where workstations cannot communicate with the file server). When operating in this mode, normal sales transactions can be completed and saved on the local hard drive of each independent workstation. Once the cause of the network failure is identified and corrected, the transactions recorded on each independent workstation may be merged into the primary database on the network server. Note: Generally, a network failure, as is relevant to this section should not be confused with a loss of an internet connection, in which case KeyPay s Dial-Up Backup feature would automatically take over (if enabled). However, if your business relies on some form of wide area network where normal access to primary data files requires the internet, some aspects of this configuration may be utilized with the guidance of an experienced dealer. How it works: 1. The Keystroke program must be fully installed on the local hard drive of each computer (as opposed to a Client installation), and configured to normally access data files located on the network server (using Startup Switches or.ini file settings). The KeyPay service should be setup on one machine with internet access to process normal transaction requests made to the server data directory. 2. Using an automated batch process that runs on a daily basis (perhaps as part of a regular backup routine), data files from the file server must be copied to each local machine in advance (prior to an unexpected network outage). Typically, transaction data files should be excluded from this copy procedure (or they may be deleted from the local data directory) in order to simplify the recovery procedure (step 4. below). 3. The KeyPay.exe program should be setup on the local machine to look for transaction requests in the local data directory prepared in step In the event of a network failure requiring Keystroke to be operated in this stand-alone mode, Keystroke and KeyPay may be started on each workstation using Startup Switches or.ini file settings that direct the programs to access local data files (from step 2. and 3. above). A batch file or program shortcut should be pre-configured on each workstation for this purpose, with precautions taken to prevent this mode from being utilized unnecessarily. Note: Each stand-alone workstation will need either an internet connection or modem and phone line to process payments in this mode. 5. When the network is restored, transactions from each workstation can be merged back into the primary database using the RECMRG.EXE program. For additional instructions on using this special utility program, please see RECMRG.DOC in the \KEYSTROK\DOC directory or contact your Authorized Keystroke Dealer for assistance. This procedure is intended for the temporary operations during normal system failures only. When running in stand-alone workstation mode as described above, it may be necessary to limit the use of some system operations such as editing database records, accessing alternate Sales Transaction Types, and making system configuration changes. Please consult with your Authorized Keystroke Dealer for further guidance. Page 11 of 11 12/8/2015
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Arkay Remote Data Backup Client Quick Start Guide
Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Setup for PCCharge. Important Pre-Installation Notes for PCCharge. Installation Overview. Step 1 Install And Set Up PCCharge on the Fileserver
Setup for PCCharge Before setting up PCCharge, first perform a Store Closing in The General Store. Make sure all credit card transactions have batched out under your previous authorization/batch out method.
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS
data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network
Installation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
aims sql server installation guide
aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Nortel Networks Call Center Reporting Set Up and Operation Guide
Nortel Networks Call Center Reporting Set Up and Operation Guide www.nortelnetworks.com 2001 Nortel Networks P0919439 Issue 07 (24) Table of contents How to use this guide... 5 Introduction...5 How this
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Network DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
UNICORN 6.4. Administration and Technical Manual
UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Windows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
Reseller Panel Step-by-Step Guide
1. Legal notice setup. Alternative language setup. Enter legal notice as text. Enter legal notice as link 2. ResellerPanel design. Edit colors and layout. Edit themes and icons 3. Create a new customer.
2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
Version 6.0 USER MANUAL
X-Charge Version 6.0 USER MANUAL X-Charge Version 6.0 10/10/2005 User Manual 4 Copyright 2005 by CAM Commerce Solutions, Inc. All rights reserved worldwide. This manual, as well as the software described
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
ChromQuest 5.0 Chromatography Data System
ChromQuest 5.0 Chromatography Data System Administrator Guide CHROM-97251 Revision A March 2008 2008 Thermo Fisher Scientific Inc. All rights reserved. Surveyor is a registered trademark of Thermo Fisher
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
The Welcome screen displays each time you log on to PaymentNet; it serves as your starting point or home screen.
PaymentNet Cardholder Quick Reference Card Corporate Card ffwelcome to PaymentNet The Welcome screen displays each time you log on to PaymentNet; it serves as your starting point or home screen. PaymentNet
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
Server Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
UNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
EMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at [email protected], or call
Windows Peer-to-Peer Network Configuration Guide
Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication
VinNOW-TSYS Integration Setup
VinNOW-TSYS Integration Setup Once your account is established with TSYS, and installation appoint should have been arranged. If not, contact your sales representative as these steps should be done for
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Appendix E. Captioning Manager system requirements. Installing the Captioning Manager
Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic
Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1
Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1 About Fiery Extended Applications Fiery Extended Applications (FEA) 4.1 is a package of the following applications for use
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and
POLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS
The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
NTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
Backing up IMail Server using Altaro Backup FS
Backing up IMail Server using Altaro Backup FS Purpose The purpose of this document is to provide guidelines and procedures for backing up IMail server system data and user data in case of a hardware or
Partner. Sage Pastel. Accounting. Installation Guide
Sage Pastel Accounting Partner Installation Guide Sage Pastel: +27 11 304 3000 Sage Pastel Intl: +27 11 304 3400 www.pastel.co.za www.sagepastel.com [email protected] [email protected] Sage Pastel Accounting
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...
Abila MIP. Installation Guide
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
Abila MIP. Installation User's Guide
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
SmartSync Monitor Help
1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54
NETePay 5.0 Installation & Configuration Guide FDMS Nashville Part Number: 8660.54 NETePay Installation & Configuration Guide Copyright 2011 Datacap Systems Inc. All rights reserved. This manual and the
Installation and Program Essentials
CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.
Qbox User Manual. Version 7.0
Qbox User Manual Version 7.0 Index Page 3 Page 6 Page 8 Page 9 Page 10 Page 12 Page 14 Page 16 Introduction Setup instructions: users creating their own account Setup instructions: invited users and team
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Scan to PC Desktop: Image Retriever 5.2 for Xerox WorkCentre C2424
Scan to PC Desktop: Image Retriever 5.2 for Xerox WorkCentre C2424 Scan to PC Desktop includes Image Retriever, which is designed to monitor a specified folder on a networked file server or local drive
ShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
Remote Backup Software User Manual V 2.0
Remote Backup Software User Manual V 2.0 Table of Contents Chapter 1 Welcome to Remote Backup Software... 2 1.1 Overview... 2 1.2 Computer Disposition Request... 2 1.3 Convention... 2 Chapter 2 Installing
FrontDesk Installation And Configuration
Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer
LifeCyclePlus Version 1
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
Configure SPLM 2012 on Windows 7 Laptop
Configure SPLM 2012 on Windows 7 Laptop 7/12/2012 SmartPlant License Manager (SPLM) requires a static IP Address on the license machine. To fulfill this requirement on laptops a virtual network adapter
Info-Alert Guide. Version 7.5
Info-Alert Guide Version 7.5 1995 2008 Open Systems Holdings Corp. All rights reserved. Document Number 2290.IA020 No part of this manual may be reproduced by any means without the written permission of
Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide.
Version 4.61 or Later Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. This manual, as well as the software described in it, is furnished
ecommerce Advantage 7.0 User Guide
ecommerce Advantage 7.0 User Guide 2002 Nodus Technologies - All Rights Reserved ECOMMERCE ADVANTAGE 7.0 USER GUIDE 2 Table of Contents TABLE OF CONTENTS...2 INTRODUCTION...5 PRODUCT FEATURES...6 TERMS
Cloud9 Quick Start Guide for CRG
Cloud9 Quick Start Guide for CRG Contents 1. Topology... 2 1.1 Machine A... 2 1.2 Machine1~N... 2 2. Install and Configure CreditLine... 3 2.1 CreditLine Server... 3 2.2 CreditLine Client... 3 3. Install
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
Install MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration
Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,
Credit Card Overview & Processing Guide entrée Version 3
Credit Card Overview & Processing Guide entrée Version 3 2000-2016 NECS, Inc. All Rights Reserved. I entrée V3 Credit Card Processing Guide Table of Contents Chapter I V3 Credit Card Overview 1 1 Obtain...
SWCS 4.2 Client Configuration Users Guide Revision 49. 11/26/2012 Solatech, Inc.
SWCS 4.2 Client Configuration Users Guide Revision 49 11/26/2012 Solatech, Inc. Contents Introduction... 4 Installation... 4 Running the Utility... 4 Company Database Tasks... 4 Verifying a Company...
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Welcome to MaxMobile. Introduction. System Requirements
MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can
IsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: [email protected]
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Liebert Nform Infrastructure Monitoring Software. User Manual - Version 4
Liebert Nform Infrastructure Monitoring Software User Manual - Version 4 TABLE OF CONTENTS 1.0 ABOUT LIEBERT NFORM................................................1 1.1 How Do You Contact Emerson Network
Kaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
How To Install And Configure Windows Server 2003 On A Student Computer
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
PREFACE http://www.okiprintingsolutions.com 07108001 iss.01 -
Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh...
Chapter7 Setting the Receiving PC for Direct Upload Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... 153 Setting the Receiving PC for Direct Upload This section explains
MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
Installation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
PAYware SIMM Interface
PAYware SIMM Interface Installation Guide For PAYware PC, PCCharge, and PAYware Connect (formerly IPCharge) Last Revised 2/27/15 IMPORTANT: On March 1st 2015, ASI implemented it new Gateway policy. Restaurant
Getting Started with POS. Omni POS Getting Started Manual. switched on accounting
Omni POS Getting Started Manual switched on accounting i i Getting Started with Omni POS Table Of Contents Overview...1 Setting up POS...2 Initial Steps...2 Tellers...2 POS Clearing Account...3 Printing...4
Magento Extension Point of Sales User Manual Version 1.0
Magento Extension Point of Sales Version 1.0 1. Overview... 2 2. Integration... 2 3. General Settings... 3 3.1 Point of sales Settings... 3 3.2 Magento Client Computer Settings... 3 4. POS settings...
How To Set Up Total Recall Web On A Microsoft Memorybook 2.5.2.2 (For A Microtron)
Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL
VinNOW/TSYS Integration Setup. Overview
Overview TSYS credit card processing communications to the gateway are all done via LAN internet linked PAX payment terminals. The terminals supplied by TSYS have the client s merchant account information
Chapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
